{"id":"https://openalex.org/W2998423913","doi":"https://doi.org/10.1587/transfun.2019cip0008","title":"Decentralized Attribute-Based Encryption and Signatures","display_name":"Decentralized Attribute-Based Encryption and Signatures","publication_year":2019,"publication_date":"2019-12-31","ids":{"openalex":"https://openalex.org/W2998423913","doi":"https://doi.org/10.1587/transfun.2019cip0008","mag":"2998423913"},"language":"en","primary_location":{"id":"doi:10.1587/transfun.2019cip0008","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transfun.2019cip0008","pdf_url":"https://www.jstage.jst.go.jp/article/transfun/E103.A/1/E103.A_2019CIP0008/_pdf","source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.jstage.jst.go.jp/article/transfun/E103.A/1/E103.A_2019CIP0008/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029108964","display_name":"Tatsuaki Okamoto","orcid":"https://orcid.org/0000-0001-7803-812X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tatsuaki OKAMOTO","raw_affiliation_strings":["NTT Research Inc"],"affiliations":[{"raw_affiliation_string":"NTT Research Inc","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010032290","display_name":"Katsuyuki Takashima","orcid":"https://orcid.org/0000-0001-5216-2229"},"institutions":[{"id":"https://openalex.org/I4210159266","display_name":"Mitsubishi Electric (United States)","ror":"https://ror.org/053jnhe44","country_code":"US","type":"company","lineage":["https://openalex.org/I1306287861","https://openalex.org/I4210133125","https://openalex.org/I4210159266"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Katsuyuki TAKASHIMA","raw_affiliation_strings":["Information Technology R&D Center, Mitsubishi Electric Corporation"],"affiliations":[{"raw_affiliation_string":"Information Technology R&D Center, Mitsubishi Electric Corporation","institution_ids":["https://openalex.org/I4210159266"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5029108964"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9801,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.8283087,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"E103.A","issue":"1","first_page":"41","last_page":"73"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.961899995803833,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.8393261432647705},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7331644296646118},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7059711217880249},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.7013328671455383},{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.6528370976448059},{"id":"https://openalex.org/keywords/access-structure","display_name":"Access structure","score":0.5701789855957031},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5512927770614624},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5310243368148804},{"id":"https://openalex.org/keywords/monotone-polygon","display_name":"Monotone polygon","score":0.48264485597610474},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48072102665901184},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.46580225229263306},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4362573027610779},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.420302152633667},{"id":"https://openalex.org/keywords/bilinear-map","display_name":"Bilinear map","score":0.4180167317390442},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23562398552894592},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.21705910563468933},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20499500632286072},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.1342160701751709}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.8393261432647705},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7331644296646118},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7059711217880249},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.7013328671455383},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.6528370976448059},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.5701789855957031},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5512927770614624},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5310243368148804},{"id":"https://openalex.org/C2834757","wikidata":"https://www.wikidata.org/wiki/Q4925424","display_name":"Monotone polygon","level":2,"score":0.48264485597610474},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48072102665901184},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.46580225229263306},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4362573027610779},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.420302152633667},{"id":"https://openalex.org/C142685569","wikidata":"https://www.wikidata.org/wiki/Q1086961","display_name":"Bilinear map","level":3,"score":0.4180167317390442},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23562398552894592},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.21705910563468933},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20499500632286072},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.1342160701751709},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transfun.2019cip0008","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transfun.2019cip0008","pdf_url":"https://www.jstage.jst.go.jp/article/transfun/E103.A/1/E103.A_2019CIP0008/_pdf","source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transfun.2019cip0008","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transfun.2019cip0008","pdf_url":"https://www.jstage.jst.go.jp/article/transfun/E103.A/1/E103.A_2019CIP0008/_pdf","source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7799999713897705,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2998423913.pdf","grobid_xml":"https://content.openalex.org/works/W2998423913.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W137962550","https://openalex.org/W1484751769","https://openalex.org/W1498316612","https://openalex.org/W1511513446","https://openalex.org/W1517505812","https://openalex.org/W1546774120","https://openalex.org/W1682451491","https://openalex.org/W1738223579","https://openalex.org/W1763482972","https://openalex.org/W1797206029","https://openalex.org/W1828411905","https://openalex.org/W1888254701","https://openalex.org/W1931152882","https://openalex.org/W1976420017","https://openalex.org/W1983238288","https://openalex.org/W2031618446","https://openalex.org/W2076046175","https://openalex.org/W2084149425","https://openalex.org/W2096113448","https://openalex.org/W2101007887","https://openalex.org/W2108072891","https://openalex.org/W2114296987","https://openalex.org/W2117685508","https://openalex.org/W2117854222","https://openalex.org/W2129483619","https://openalex.org/W2129596906","https://openalex.org/W2138001464","https://openalex.org/W2150399720","https://openalex.org/W2152924492","https://openalex.org/W2160608575","https://openalex.org/W2161214158","https://openalex.org/W2165210192","https://openalex.org/W2168028748","https://openalex.org/W2172174332","https://openalex.org/W2186153718","https://openalex.org/W2231711433","https://openalex.org/W2399345613","https://openalex.org/W2401712396","https://openalex.org/W2477011922","https://openalex.org/W2619380141","https://openalex.org/W3109425694"],"related_works":["https://openalex.org/W2016918875","https://openalex.org/W2076046175","https://openalex.org/W2530459946","https://openalex.org/W2915827760","https://openalex.org/W4312214469","https://openalex.org/W2870698809","https://openalex.org/W2956058931","https://openalex.org/W3205194436","https://openalex.org/W3144611266","https://openalex.org/W2770844835"],"abstract_inverted_index":{"This":[0,184],"paper":[1,185],"presents":[2],"decentralized":[3,70,119],"multi-authority":[4],"attribute-based":[5],"encryption":[6],"and":[7,10,19,38,51,59,78,95,205,231,243,249],"signature":[8],"(DMA-ABE":[9],"DMA-ABS)":[11],"schemes,":[12,61],"in":[13,67,179,212],"which":[14,42,169,199],"no":[15,20],"central":[16],"authority":[17,77,108],"exists":[18],"global":[21],"coordination":[22],"is":[23,158,170,200,218,234],"required":[24],"except":[25],"for":[26,32,82,162,192],"the":[27,56,106,121,152,159,174,180,188,209,213,228,239],"setting":[28],"of":[29,101,148,151,222,227,238],"a":[30,33,39,68,80,83,87,99,135,142,219],"parameter":[31],"prime":[34],"order":[35],"bilinear":[36],"group":[37],"hash":[40],"function,":[41],"can":[43,64,74,140],"be":[44,65],"available":[45],"from":[46,105],"public":[47],"documents,":[48],"e.g.,":[49],"ISO":[50],"FIPS":[52],"official":[53],"documents.":[54],"In":[55],"proposed":[57,122,155,229],"DMA-ABE":[58,161,230],"DMA-ABS":[60,190,217,232],"every":[62],"process":[63],"executed":[66],"fully":[69,118,201],"manner;":[71],"any":[72,92,112],"party":[73],"become":[75],"an":[76],"issue":[79],"piece":[81,100],"secret":[84,103,145],"key":[85,104],"to":[86,134,236],"user":[88,97,136],"without":[89,109],"interacting":[90,110],"with":[91,111,246],"other":[93,113],"party,":[94],"each":[96],"obtains":[98],"his/her":[102],"associated":[107],"party.":[114],"While":[115],"enjoying":[116],"such":[117],"processes,":[120],"schemes":[123,233,245],"are":[124],"still":[125],"secure":[126,172],"against":[127],"collusion":[128,143],"attacks,":[129],"i.e.,":[130],"multiple":[131],"pieces":[132],"issued":[133],"by":[137],"different":[138],"authorities":[139],"form":[141],"resistant":[144],"key,":[146],"composed":[147],"these":[149],"pieces,":[150],"user.":[153],"The":[154,225],"ABE":[156,242],"scheme":[157,191],"first":[160,189],"non-monotone":[163,193],"relations":[164,194,248],"(and":[165,195],"more":[166,196],"general":[167,197],"relations),":[168,198],"adaptively":[171],"under":[173,208],"decisional":[175],"linear":[176],"(DLIN)":[177],"assumption":[178,211],"random":[181,214],"oracle":[182,215],"model.":[183,216],"also":[186],"proposes":[187],"secure,":[202],"adaptive-predicate":[203],"unforgeable":[204],"perfect":[206],"private,":[207],"DLIN":[210],"generalized":[220],"notion":[221],"ring":[223],"signatures.":[224],"efficiency":[226],"comparable":[235,247],"those":[237],"existing":[240],"practical":[241],"ABS":[244],"security.":[250]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
